<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA show access-list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160553#M1115062</link>
    <description>&lt;P&gt;You can not use&amp;nbsp; "|&amp;nbsp; include" more than once in a single command.&amp;nbsp; But you may try&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;sh run | incl&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;access-list .* domain&lt;/STRONG&gt;" which will include&amp;nbsp; all lines in the output, that match "&lt;STRONG&gt;access-list&lt;/STRONG&gt; "&amp;nbsp; followed by any string followed&amp;nbsp; by "&lt;STRONG&gt;domain&lt;/STRONG&gt;". The argument for "include"&amp;nbsp; is not a fixed string but&amp;nbsp; a&amp;nbsp; regular expression, and in regular expressions ""." matches any single character and ".*" an&amp;nbsp; sequence of 0 or more&amp;nbsp; characters.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2024 23:47:02 GMT</pubDate>
    <dc:creator>jilse-iph</dc:creator>
    <dc:date>2024-08-13T23:47:02Z</dc:date>
    <item>
      <title>ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936395#M30977</link>
      <description>&lt;P&gt;Using OS Code:&amp;nbsp;9.10(1)27&lt;/P&gt;&lt;P&gt;When I do show access-list it gives me output with ACLs having object-groups in source and destination however under that it also list the IPs covered under that object group. I do not want that detailed listing and only the ACLs.&lt;/P&gt;&lt;P&gt;Which syntax can help solve the issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;access-list FROM_INSIDE line 210 extended permit tcp object-group TEST object-group TEST2 eq domain log informational interval 300 (hitcnt=579365) 0xf1ddea09&lt;BR /&gt;access-list FROM_INSIDE line 210 extended permit tcp host 10.10.11.38 host 172.16.16.34 eq domain log informational interval 300 (hitcnt=0) 0xd70b150e&lt;BR /&gt;access-list FROM_INSIDE line 210 extended permit tcp host 10.10.11.38 host 172.16.16.36 eq domain log informational interval 300 (hitcnt=577245) 0x9f14c919&lt;BR /&gt;access-list FROM_INSIDE line 211 extended permit udp object-group TEST object-group TEST2 eq domain log informational interval 300 (hitcnt=233) 0x8e1fe74c&lt;BR /&gt;access-list FROM_INSIDE line 211 extended permit udp host 10.10.11.38 host 172.16.16.34 eq domain log informational interval 300 (hitcnt=0) 0x499db61a&lt;BR /&gt;access-list FROM_INSIDE line 211 extended permit udp host 10.10.11.38 host 172.16.16.36 eq domain log informational interval 300 (hitcnt=233) 0xa10ea8f2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Want to get rid of line 2,3,5,6 in the output.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 13:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936395#M30977</guid>
      <dc:creator>ring zer0</dc:creator>
      <dc:date>2019-10-07T13:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936417#M30978</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;If you don't want the ACL expansion, why not just use&lt;STRONG&gt; sh run | inc access-list&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 13:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936417#M30978</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-10-07T13:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936421#M30979</link>
      <description>2 Reasons&lt;BR /&gt;1 ) I want to filter out all ACLs with DNS and when I tried "sh run | incl access-list | incl domain" it does not work as expected.&lt;BR /&gt;2 ) I also want to see hit counts on ACLs which "show run" does not shows.</description>
      <pubDate>Mon, 07 Oct 2019 13:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936421#M30979</guid>
      <dc:creator>ring zer0</dc:creator>
      <dc:date>2019-10-07T13:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936429#M30980</link>
      <description>&lt;P&gt;After the initial pipe ( | ) any subsequent vertical bar is interpreted as a logical OR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could try &lt;STRONG&gt;sh run access-list | inc domain&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately there are no attributes you could regex which would exclude the expanded ACL output. Something like:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;^\s{2}access-list&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...would work great! As it is, if you want hit counts you have to use sh access-list. You could always export the output to a text handler which is more regex compliant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 13:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936429#M30980</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-10-07T13:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936434#M30981</link>
      <description>&lt;P&gt;That's what I am doing , get output from show access-list | incl domain , copy in notepad and remove the undesired parts. Thought there might be a automated workaround for this.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 14:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936434#M30981</guid>
      <dc:creator>ring zer0</dc:creator>
      <dc:date>2019-10-07T14:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936440#M30982</link>
      <description>&lt;P&gt;You mention notepad so you must be using windows. If you have access to Linux, the process can be achieved with the following command:&lt;/P&gt;
&lt;PRE&gt;grep -v '^\s\saccess-list' acl_input.txt  &amp;gt; acl_output.txt&lt;/PRE&gt;
&lt;P&gt;acl_input.txt would contain:&lt;/P&gt;
&lt;PRE&gt;access-list foobar line 1 ext permit object-group FOO …
  access-list foobar line 1 ext permit 192.168.1.1 …
  access-list foobar line 1 ext permit 192.168.1.2 …&lt;/PRE&gt;
&lt;P&gt;..the resulting output (acl_output.txt) would contain just:&lt;/P&gt;
&lt;PRE&gt;access-list foobar line 1 ext permit object-group FOO …&lt;/PRE&gt;
&lt;P&gt;I know Notepad++ support regex search, you might be able to leverage that to produce the output. Or just spin up a Linux VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 14:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/3936440#M30982</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-10-07T14:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/4612394#M1090181</link>
      <description>&lt;P&gt;I agree that this is annoying, that there seems to be no command to allow seeing the hitcounts of the policies, but not the expansion.&lt;BR /&gt;&lt;BR /&gt;I have discovered a way to see the hitcounts, without the expansion. Because the lines of the expansion are indented two spaces. you can use the following command to just see the non-expansion lines:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;show access-list | exclude . access-list&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Note, that is 'show access-list | ex (dot)(space)access-list'. I suspect regex gurus may have a cleaner way to do this, but it works.&lt;/P&gt;&lt;P&gt;This does not inherently match your example, as also excluding lines with 'domain' might be tricky.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 14:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/4612394#M1090181</guid>
      <dc:creator>cosmic</dc:creator>
      <dc:date>2022-05-18T14:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160552#M1115061</link>
      <description>&lt;P&gt;"&lt;STRONG&gt;sh run | inc access-list"&amp;nbsp;&lt;/STRONG&gt;is&amp;nbsp; nott necessary,&amp;nbsp; you may&amp;nbsp; also&amp;nbsp; use&amp;nbsp; "&lt;STRONG&gt;sh run access-list&lt;/STRONG&gt;". Youma also restrict&amp;nbsp; the&amp;nbsp; outputt&amp;nbsp; toone access-list, if you add tthe&amp;nbsp; access-listname&amp;nbsp; to the command:&amp;nbsp;&amp;nbsp;"&lt;STRONG&gt;sh run access-list&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;FROM_INSIDE&lt;/SPAN&gt;&lt;/STRONG&gt;".&amp;nbsp; If you&amp;nbsp; also want to see&amp;nbsp; tthhe sequence numbers&amp;nbsp; and&amp;nbsp; tthe matches for every access-list&amp;nbsp; entry, you can try "&lt;STRONG&gt;show access-list FROM-INSIDE | inc ^a&lt;/STRONG&gt;", because that will show&amp;nbsp; only the "unexpanded" lines (the "expanded" lines for each access-list entry begin with a blank character and will not match the regular&amp;nbsp; expression "^a",&amp;nbsp; so they will not be included in the output).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 23:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160552#M1115061</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2024-08-13T23:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160553#M1115062</link>
      <description>&lt;P&gt;You can not use&amp;nbsp; "|&amp;nbsp; include" more than once in a single command.&amp;nbsp; But you may try&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;sh run | incl&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;access-list .* domain&lt;/STRONG&gt;" which will include&amp;nbsp; all lines in the output, that match "&lt;STRONG&gt;access-list&lt;/STRONG&gt; "&amp;nbsp; followed by any string followed&amp;nbsp; by "&lt;STRONG&gt;domain&lt;/STRONG&gt;". The argument for "include"&amp;nbsp; is not a fixed string but&amp;nbsp; a&amp;nbsp; regular expression, and in regular expressions ""." matches any single character and ".*" an&amp;nbsp; sequence of 0 or more&amp;nbsp; characters.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 23:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160553#M1115062</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2024-08-13T23:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA show access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160554#M1115063</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;I agree that this is annoying, that there seems to be no command to allow seeing the hitcounts of the policies, but not the expansion."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Bur&amp;nbsp; there &lt;STRONG&gt;is&lt;/STRONG&gt; such a command.&amp;nbsp; If you&amp;nbsp; look carefull&amp;nbsp; on&amp;nbsp; te output of "show&amp;nbsp; access-list", you&amp;nbsp; may notice, that&amp;nbsp; the "expaned&amp;nbsp; lines"&amp;nbsp; areprefixed with a space. If you want&amp;nbsp; to&amp;nbsp; see&amp;nbsp; only&amp;nbsp; the access-list with hitcounts&amp;nbsp; but witout the expansions, you&amp;nbsp; can use "show access-list | include ^a" (wihch will not include&amp;nbsp; lines beginning wwit&amp;nbsp; a space).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 23:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-show-access-list/m-p/5160554#M1115063</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2024-08-13T23:55:17Z</dc:date>
    </item>
  </channel>
</rss>

